View Control Risks' outlook for global business in the year ahead

RiskMap 2019 is here!

View Control Risks' outlook for global business in the year ahead

Welcome to Control Risks

We are a specialist global risk consultancy that helps organisations succeed in a volatile world. Through insight, intelligence and technology, we help you seize opportunities while remaining secure, compliant and resilient. When crises and complex issues arise, we help you recover.

Control Risks in the media

Orthodoxy and innovation: crisis readiness, response and recovery

Today’s crises are more frequent and more complex than ever. They challenge an organization’s resilience as never before. As the nature of crises changes, so must your organization. How do you stand ready, respond effectively and recover stronger?

Future-proofing your China business

Average Risk-Reward score on African continent keeps improving

Upcoming elections across the African continent are put into perspective. Uganda and Rwanda are demanding more attention as up and coming African markets and Tunisia finally begins to see some positive effects.

About us

Global Offices

Our Experts

Our global team of experts are multinational and multi-disciplined.

Search our experts area

Core

Control Risks CORE is the essential risk monitoring toolkit.

Discover CORE

Changing patterns in terrorism

Islamic State is under pressure following territorial losses in the Middle East. But it is not yet defeated as either a military or ideological force. Meanwhile, we are seeing increasingly diverse terrorism threats globally - not necessarily more severe, but often less predictable.

Russia sanctions: less scary than they seem?

The first indications are that, unlike in the case of Iran, doing business in Russia or with Russian firms remains possible for companies worldwide, albeit with numerous caveats and a set of compliance measures.

Cyber security through the eyes of a traveller

The ubiquity of the cloud, WiFi networks and cheaper roaming charges enable travellers to be connected throughout their journey – but also present opportunities for cyber threat actors to target new technologies, which are often built with limited or no security.